Best Practices for Zimbra Email Security

Email contains our most valuable data, yet we often show little concern for its security and protection. Password strength and security are the most substantial components of basic data security. Strong passwords—or even better, strong passphrases—help protect the sensitive data contained inside your business user mailboxes. Because so many password-recovery systems use email, accessing company […]
Converting an old HTML website to modern WordPress

Many websites developed ten or more years ago worked great at the time but have slowly fell out of style and usefulness as the internet has grown and evolved. These sites lack support for mobile screens, miss expected modern features, and often show stale design that conveys a sense of an abandoned endeavor like a […]
Gag Me with an Order

Sharp eyed monitors of our transparency page may have noticed XMission stepping back in time to log a U.S. Department of Justice warrant from February. This warrant carried a six-month gag order. When I received it, I respected the gag order and simply made a note in my personal calendar as to when I could […]
How Secure is your Password?

Many of us have seen or personally experienced identity theft and financial fraud, so, why don’t we think about email fraud? Typically, we realize that something is wrong with our email accounts only after they have been compromised by a third party. Today, we want to let you know that compromised email often happens because […]
XMission Proudly Sponsors Summer Festivals in SLC!

We know how to celebrate our summer season here in Utah. Every year, XMission sponsors a number of downtown summer events that bring thousands of visitors to Salt Lake City. Please attend these events and support our incredible artists, performers, and vendors! This weekend, the Salt Lake Arts Council starts the season off right with […]
My Unsubmitted Submission to the FCC on Title II and Net Neutrality

I went to http://gofccyourself.com today to give the FCC my opinion regarding their pending decision on Title II classification of Internet Service Providers that will affect Net Neutrality enforcement. Unsurprisingly, after entered, the button labeled “Submit” does nothing. So here it is for your reading pleasure. I encourage you to try to submit comments to […]
Media Release: EdgeConneX® Partners with the Salt Lake Internet eXchange, Offering Connectivity to 10+ Unique Networks

Salt Lake Internet eXchange Provides Tethered Connectivity and Peering via EdgeConneX-XMission Partnership, Creating the Shortest and Most Direct Routes for Content, Cloud and IoT Localization Herndon, VA – April 5, 2017 – EdgeConneX®, specializing in global data center solutions at the edge of the network, today announces its partnership with the Salt Lake Internet eXchange […]
Empty Your Pockets for Love UT Give UT on March 30

Join with XMission and thousands of your fellow Utahns on March 30 to support the 5th anniversary of Love UT Give UT, a day-long fundraising event benefitting Utah nonprofits. Love UT Give UT, an initiative of The Community Foundation of Utah, leverages technology to make the giving process easier than ever. Give where you live! […]
Register for BSidesSLC 2017 before it’s too late!

Our friends over at BSidesSLC are actively registering smart people like you for their 2017 conference! If you work in information security, or want to expand your skill set, you’ll definitely want to attend. At BSidesSLC, you’ll have a lot of fun learning about and discussing emerging security issues while socializing with industry experts. When: […]
6 steps to Zimbra two-factor authentication with YubiKey

We are proud to announce that XMission Zimbra Email and Collaboration now features two-factor authentication (2FA). Two-factor authentication is a technology that provides identification of users utilizing two different components. Typically something that you know (like a password, UserID, etc) and something you have (a smartphone, USB-key, etc.). Using 2FA protects you against phishing and other sophisticated attacks. In this […]